Sciweavers

282 search results - page 8 / 57
» Improved Thumbprint and Its Application for Intrusion Detect...
Sort
View
SPIRE
2000
Springer
15 years 1 months ago
Fast Multipattern Search Algorithms for Intrusion Detection
We present new search algorithms to detect the occurrences of any pattern from a given pattern set in a text, allowing in the occurrences a limited number of spurious text charact...
Josué Kuri, Gonzalo Navarro
GLOBECOM
2007
IEEE
15 years 3 months ago
Aggregated Bloom Filters for Intrusion Detection and Prevention Hardware
—Bloom Filters (BFs) are fundamental building blocks in various network security applications, where packets from high-speed links are processed using state-of-the-art hardwareba...
N. Sertac Artan, Kaustubh Sinkar, Jalpa Patel, H. ...
IUI
2005
ACM
15 years 3 months ago
Context-based similar words detection and its application in specialized search engines
This paper presents a new context-based method for automatic detection and extraction of similar and related words from texts. Finding similar words is a very important task for m...
Hisham Al-Mubaid, Ping Chen
FPL
2006
Springer
120views Hardware» more  FPL 2006»
15 years 1 months ago
Regular Expression Software Deceleration for Intrusion Detection Systems
The use of reconfigurable hardware for network security applications has recently made great strides as FPGA devices have provided larger and faster resources. Regular expressions...
Zachary K. Baker, Viktor K. Prasanna, Hong-Jip Jun...
INTERSPEECH
2010
14 years 4 months ago
Data-dependent evaluator modeling and its application to emotional valence classification from speech
Practical supervised learning scenarios involving subjectively evaluated data have multiple evaluators, each giving their noisy version of the hidden ground truth. Majority logic ...
Kartik Audhkhasi, Shrikanth S. Narayanan